SHARE



ABOUT THE AUTHOR


Dave Michels
Dave Michels is a Principal Analyst at TalkingPointz. His unique perspective on unified communications comes from a career involving telecommunications...
Read Full Bio >>
SHARE



Dave Michels | June 08, 2016 |

 
   

Cisco's Secret Spark

Cisco's Secret Spark In a whitepaper published today, Cisco reveals its unique approach to giving Spark a way to search content it can't see.

In a whitepaper published today, Cisco reveals its unique approach to giving Spark a way to search content it can't see.

Since introducing Spark, Cisco has been hinting that it is working on a new way of providing security and ensuring privacy for its cloud-based workstream messaging service. Until now, it's been hesitant to provide details while it puts the pieces in place. Today, Cisco published a whitepaper that reveals a unique approach to encrypted cloud-delivered services.

What Cisco describes is a whole new way to do cloud-based security management with the potential to end the long-established trade-off between search and privacy. Spark will be capable of searching content that it can't see.

Workstream messaging services such as Spark, Slack, and many others utilize encrypted network connections. Many people assume that this equates to encrypted data in the cloud. Unfortunately, link security only protects against network transit interception. The mother lode of data sits at rest in the cloud -- unencrypted.

Encrypting data is not difficult, but creates inconvenience and a loss of features -- the biggest being search. Content repositories are usually too large for client-side searching, so providers index the content on their servers. This has meant providers have access to data -- even confidential data -- and that data has no protection against various provider risks, including snooping, extortion, hacks, bribery, or even the handing over of corporate data in response to a subpoena.

Privacy breaches are the dark underbelly of digitization, and their potential remains one of the barriers to enterprise cloud adoption. Workstream messaging facilitates collaboration, but sensitive conversations and content becomes digital, searchable, and stored off-site.

For example, the Slack security policy states "every person and team using our service expects their data to be secure and confidential." But that data is off-site, unencrypted, and accessible to Slack. Slack's operational procedures clarify this: "The operation of the Slack services requires that some employees have access to the systems which store and process Customer Data....These employees are prohibited from using these permissions to view Customer Data unless it is necessary to do so."

These policies clarify intent, but that isn't sufficient for all enterprises. I've spoken to several companies that prohibit the use of cloud-based messaging services per their security or compliance policies. Cisco believes it has cracked the code, and can host and index content without requiring access to it.

Encrypting Stored Data
Cisco uses a modular architecture for Spark that enables it to create a portable key management system (KMS) to control and manage encryption keys. The core Spark service (and authorized Cisco employees) only have access to encrypted data. The KMS leverages modern encryption technologies with public and private keys that both protect and validate the data.

Cisco has designed the core Spark service for encrypted data. The KMS architecture is already in place within the Cisco-controlled Spark cloud. Now Cisco has separated the KMS from the rest of Spark so that it could potentially live in an enterprise's data center. As with other encrypted services, the enterprise will require a third-party certificate authority (CA). Spark can utilize any CA that the enterprise customer trusts -- including private CAs.

Spark clients encrypt content using the public key of the KMS, thus don't need their own certificates. Once the client authenticates with the Spark service, an encrypted channel is established and it can request a separate conversation key. Each Spark room has its own key shared among the room's participants. A new conversation key is generated as needed with changes in participant rights.

Finding Dory
Cisco solved the search problem by creating the search index with encrypted data. This is accomplished in a separate module known as the Indexer. The Indexer is a security layer bot that is effectively a participant in every room.

The Indexer builds an encrypted index for each room by using a cryptographic one-way hash function to each word in the conversation thread. The output is an index of hash codes, not user data. Converting the hashed data back to the original text is not possible. An index is maintained for each room and stored in the Spark cloud.

A user submits encrypted search requests to the Spark core service. Since the Spark service cannot read encrypted data, the service forwards requests to the Indexer module. There it gets decrypted and hashed. Spark then searches for hashed terms inside a hashed database. Each room has its own hash function, and search requests are generated on a room-by-room basis.

Like the KMS, the Indexer modules live outside the core Spark service, and Cisco intends to enable either or both to optionally live in enterprise data centers. It appears that Cisco does not want actual or perceived access to customer data or encryption keys.

This explanation above is highly simplified. The whitepaper outlines many other steps and processes. For example, the Indexer utilizes a random noise generator to protect against frequency analysis breaches.

To accommodate custom development efforts, Cisco provides three levels of data access for extensibility. It offers enterprise-wide bots that can have access to each room, user applications with access to a user's rooms, and URLs for simplified access such as posting content to a room.

The architecture appears secure, but adds inefficiencies. If the data were not encrypted, only a single index would need to be maintained. Because each room is encrypted with separate keys, separate indexes are required for each room, and separate searches must be submitted for each index. If a user has access to 10 rooms, then a single search could potentially turn into 10 searches. If that single search includes two words, it becomes 20 searches.

But as a cloud service, Spark's inefficiencies are Cisco's problem -- as long as they don't result in noticeable delays. The trade-off is a robust set of services that otherwise may not be available to organizations with strict data storage requirements. Another limitation is the indexes are made-up of single words, so there's no way to restrict searches to specific strings (words in a specific order) at this time. However, I learned in speaking with Cisco, the company intends to expand search capability including support for Boolean operators.

Who Said What?
Another architectural aspect relating to Spark security is Obfuscated Identity. User identity lives in Spark's Common Identity Engine, but message routing and most of Spark's other services don't include user names, but a unique user code. Unlike email, Spark services use these identifiers instead of real names to limit exposure and increase system anonymity.

While Cisco indicated that these architectural enhancements are not attributable to the March acquisition of Synata, the company does offer conceptually similar capabilities regarding encrypted search. At the time of the acquisition, Rowan Trollope, SVP and GM, Collaboration Technology Group at Cisco, even indicated Synata was working on the problem of "searching for data you can't see." Perhaps the acquisition may have been an acqui-hire or related to patents.

These are significant enhancements to the emerging and sector of workstream messaging. This approach could open up a new era of cloud acceptance and capability. The space is growing so quickly it's hard to tell if security limitations are a factor, but it seems reasonable this could further accelerate adoption.

Dave Michels is a contributing editor and analyst at TalkingPointz.

Follow Dave Michels on Twitter and Google+!
@DaveMichels
Dave Michels on Google+





COMMENTS



Enterprise Connect Orlando 2017
March 27-30 | Orlando, FL
Connect with the Entire Enterprise Communications & Collaboration Ecosystem


Stay Up-to-Date: Hear industry visionaries in Keynotes and General Sessions delivering the latest insight on UC, mobility, collaboration and cloud

Grow Your Network: Connect with the largest gathering of enterprise IT and business leaders and influencers

Learn From Industry Leaders: Attend a full range of Conference Sessions, Free Programs and Special Events

Evaluate All Your Options: Engage with 190+ of the leading equipment, software and service providers

Have Fun! Mingle with sponsors, exhibitors, attendees, guest speakers and industry players during evening receptions

Special Offer - Save $200 Off Advance Rates

Register now with code NOJITTEREB to save $200 Off Advance Rates or get a FREE Expo Pass!

March 22, 2017

As today's competitive business environments push workforces into overdrive, many enterprises are seeking ways of streamlining workflows while optimizing productivity, business agility, and speed.

March 8, 2017

Enterprise IT's ability to innovate is critical to the success of the business -- 80% of CIOs agree. But the CIO role has never been more challenging than it is today, with rising operational respo

February 22, 2017

Sick of video call technology that make participants look like they're in the witness protection program? Turns out youre not alone. Poor-quality video solutions can give users an unprofessional ap

March 15, 2017
Andrew Prokop, communications evangelist with Arrow Systems Integration, discusses the evolving role of the all-important session border controller.
March 9, 2017
Organizer Alan Quayle gives us the lowdown on programmable communications and all you need to know about participating in this pre-Enterprise Connect hackathon.
March 3, 2017
From protecting against new vulnerabilities to keeping security assessments up to date, security consultant Mark Collier shares tips on how best to protect your UC systems.
February 24, 2017
UC analyst Blair Pleasant sorts through the myriad cloud architectural models underlying UCaaS and CCaaS offerings, and explains why knowing the differences matter.
February 17, 2017
From the most basics of basics to the hidden gotchas, UC consultant Melissa Swartz helps demystify the complex world of SIP trunking.
February 7, 2017
UC&C consultant Kevin Kieller, a partner at enableUC, shares pointers for making the right architectural choices for your Skype for Business deployment.
February 1, 2017
Elka Popova, a Frost & Sullivan program director, shares a status report on the UCaaS market today and offers her perspective on what large enterprises need before committing to UC in the cloud.
January 26, 2017
Andrew Davis, co-founder of Wainhouse Research and chair of the Video track at Enterprise Connect 2017, sorts through the myriad cloud video service options and shares how to tell if your choice is en....
January 23, 2017
Sheila McGee-Smith, Contact Center/Customer Experience track chair for Enterprise Connect 2017, tells us what we need to know about the role cloud software is playing in contact centers today.